Lists the keys in the PKCS #11 token.
evactl list-keys [-p <pin>] [-t <token>] [-v <vendor>]For example:
$ sudo evactl list-keysStarting PKCS #11 Manager...               DoneUsing token with label pking203Public Key Object; RSA 2048 bits  Label:      305ecd78340acc3d906be370a01e7884  ID:         03b1dac1e383b8d3adea5a6a2c6200bde58ffb40  Usage:      verifyPrivate Key Object; RSA 2048 bits  Label:      F  ID:         0f  Usage:      sign, unwrapPublic Key Object; RSA 2048 bits  Label:      F  ID:         0f  Usage:      verify, wrapPrivate Key Object; RSA 2048 bits  Label:      webserver-root1  ID:         103d6c94ea10b98ab37186cc1c4977eb  Usage:      signSee below for a description of each option.
-p <pin>
Authenticate in the HSM with the <pin> PIN.
Mandatory: No. When omitting this option, the command looks for the PIN in the application secrets. If not found, prompts the user for the PIN.
-t <token>
Select the HSM token with the <token> label.
Mandatory: No. When omitting this option, the command uses the value of the Token label configuration parameter.
The command will raise an error if you omit this option and the configuration is not loaded.
-v <vendor>
Use the <vendor> security module. See the following table for the supported values.
| Vendor | Security module | 
|---|---|
| none | Built-in software PKCS #11 module. | 
| nshield | nShield HSM. See HSM requirements for the supported models. | 
| thales | Thales HSM. See HSM requirements for the supported models. | 
It is recommended to select a Hardware Security Module (HSM).
Mandatory: No. When omitting this option, the command assumes the value of the Vendor configuration parameter.
The command will raise an error if you omit this option and the configuration is not loaded.